249 research outputs found

    Safetynet version 2, a packet error recovery architecture for vertical handoffs

    Get PDF
    Mobile devices are connecting to the Internet through an increasingly heterogeneous network environment. This connectivity via multiple types of wireless networks allows the mobile devices to take advantage of the high speed and the low cost of wireless local area networks and the large coverage of wireless wide area networks. To maximize the benefits from these complementing characteristics, the mobile devices need to be able to switch seamlessly between the different network types. However, the switch between the technologies, also known as a vertical handoff, often results in significant packet loss and degradation of connectivity due to handoff delay and also increased packet loss rate on the border of the coverage area of the networks. In our previous work, we have proposed an inter technology mobility management architecture which addresses the packet losses using selective resending of packets lost during the handoff period. In this paper, we extend the architecture to address packet losses due to wireless errors more efficiently by taking advantage of erasure codes to form redundancy packets. We propose to send these redundancy packets over both links. We show that this proposal reduces both the chances of packet loss and the buffering requirements of the original Safetynet scheme

    milliProxy: a TCP Proxy Architecture for 5G mmWave Cellular Systems

    Full text link
    TCP is the most widely used transport protocol in the internet. However, it offers suboptimal performance when operating over high bandwidth mmWave links. The main issues introduced by communications at such high frequencies are (i) the sensitivity to blockage and (ii) the high bandwidth fluctuations due to Line of Sight (LOS) to Non Line of Sight (NLOS) transitions and vice versa. In particular, TCP has an abstract view of the end-to-end connection, which does not properly capture the dynamics of the wireless mmWave link. The consequence is a suboptimal utilization of the available resources. In this paper we propose a TCP proxy architecture that improves the performance of TCP flows without any modification at the remote sender side. The proxy is installed in the Radio Access Network, and exploits information available at the gNB in order to maximize throughput and minimize latency.Comment: 7 pages, 6 figures, 2 tables, presented at the 2017 51st Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, 201

    Support of resource-aware vertical handovers in WLAN hotspots

    Get PDF
    Endgeräte wie Smartphones oder Tablets bieten häufig eine Vielfalt drahtloser Zugänge zum Internet an. Üblicherweise schließt dies die 802.11 WLANs und auch Technologien drahtloser Weitverkehrsnetze (WWANs) aus dem Bereich LTE oder WiMAX ein. Aufgrund dieser Optionen haben sich die Endanwender daran gewöhnt, überall und zu jeder Zeit auf ihre Internetdienste zuzugreifen. Damit hat auch der Datenverkehr pro Anwender zugenommen, was eine Herausforderung insbesondere für die Betreiber von WWANs ist. Soweit verfügbar, favorisieren Endanwender heutzutage eher einen drahtlosen Zugang zum Internet über WLANs als über WWANs. Des Weiteren haben die 3GPP-Standardisierungsgremien Ansätze erarbeitet, die zusätzlich Verkehr aus WWANs in Netze mit geringerer Abdeckung wie WLAN- oder Femto-Zellen abgeben. Solche Ansätze werden auch als "Traffic Offloading" bezeichnet und haben das Ziel, die WWANs zu entlasten. Dabei werden jedoch eher einfache Strategien verfolgt, die auf der Nutzung zusätzlicher Kapazitäten heterogener Netze beruhen und dann angewendet werden, wenn ein alternatives Zugangsnetz für ein Endgerät verfügbar ist. Im Rahmen dieser Arbeit zeigen wir Gewinne auf, die entstehen, wenn man die Auswahl der Endgeräte für ein WLAN-Netz stattdessen auf Basis der von ihnen belegten Ressourcen durchführt. In diesem Kontext schlagen wir vor, Geräte mit stark negativem Einfluss auf die WLAN-Kapazität wieder zurück in das WWAN zu reichen, was wir als "Onloading" bezeichnen. Ein solches "Onloading" zieht Herausforderungen in unterschiedlichen Richtungen mit sich. Die fortschreitende Miniaturisierung hat in den letzten Jahren zu dem Trend geführt, die Anzahl der Netzwerkkarten (NICs) in Endgeräten zu reduzieren. Wir bezeichnen eine NIC als multimodal, wenn sie mehrere Funktechnologien unterstützt, aber zu einem bestimmten Zeitpunkt immer nur eine davon genutzt werden kann. Deswegen stellt für eine multimodale NIC das "Onloading" während einer laufenden Verbindung eine Herausforderung dar. Wir schlagen einen Ansatz vor, der vorbereitende Mechanismen für ein "Onloading" als auch eine laufende Verbindung im WLAN über eine solche NIC ermöglicht. Des Weiteren ist es wichtig, in einem WLAN Hotspot zu entscheiden, welche Geräte einen negativen Einfluss auf die Kapazität des Netzes haben. Dafür haben wir eine Metrik entwickelt, die eine Entscheidungsgrundlage für das Onloading bildet. Diese Metrik basiert rein auf einer Beobachtung des Netzes und seiner Geräte, ermöglicht jedoch keine Entscheidung für sich neu assoziierende Geräte im WLAN. Erschwerend kommt hinzu, dass viele Eigenschaften der NICs durch herstellerabhängige Implementierungen geprägt werden. Solche Algorithmen bieten eine zusätzliche Herausforderung, da ihre internen Abläufe üblicherweise unbekannt sind. Ein bekanntes Beispiel für solche Algorithmen stellt die Anpassung der WLAN-Link-Datenraten dar. Diese Algorithmen wählen die jeweiligen Modulations- und Kodierungsschemata (MCSs) für die drahtlosen Übertragungen aus. Robuste MCSs resultieren dabei in geringere Link-Datenraten und haben somit einen starken Einfluss auf die Kapazität einer WLAN-Zelle. Aus diesem Grund fokussieren wir uns auf eine Abschätzung der Datenratenwahl eines Endgerätes. Damit lassen sich im Vorfeld Aussagen treffen, ob ein Gerät starken Einfluss auf die WLAN-Kapazität haben wird, so dass es für ein "Onloading" in Frage kommt.End-user devices such as smart phones and tablets have become very popular as they offer a variety of wireless Internet accesses ranging from the WLAN standards to WWAN technologies such as LTE or even WiMAX. Due to these different wireless access options and new emerging applications—e.g., from the areas of video streaming, social networks, as well as Internet clouds—people are increasingly connecting to the Internet with their de- vices while being on the move. In line with this, the number of devices as well as the traffic demand of end users have been reported to increase rapidly over the last years which imposes a strong challenge especially for the operators of WWANs. Thereby, end users frequently tend to use settings that favor a connectivity to the Internet whenever possible rather over WLAN than over WWAN access. Further, the cellular standardization bodies of the 3GPP envision solutions to hand over on-going wireless sessions from cellular to other small cell accesses such as WLANs or femto cells. This is also known as traffic offloading essentially freeing capacity in terms of users with a certain service in the cellular accesses. Nevertheless this offloading follows a rather simple strategy to utilize additional capacity of heterogeneous accesses such as WLANs whenever being available for a given device. This thesis shows that stronger gains can be expected if the selection of devices to be served in WLANs is conducted in a resource-aware fashion including an evaluation of the WLAN traffic in terms of the channel occupation time and MAC overhead as result of contention, interference, and fluctuating channels. In this context, this thesis envisions to onload unfavorable devices negatively affecting the WLAN capacity back to WWAN accesses. A support of such an onloading imposes challenges in different dimensions. From the hardware design of devices, there is a strong trend to limit the number of separate network interface cards (NICs) due to space and cost issues. We refer to a multi-mode NIC if it covers multiple technologies, while at a given time only access to one technology is possible. Thus, smoothly onloading a device with such a NIC is by far not trivial. We present an approach that conducts handover preparation mechanisms, while also allowing a continuous WLAN communication over a multi-mode NIC. Further, it is by far not trivial to judge which subset of associated devices is negatively affecting the capacity of a WLAN hotspot. Thus, a careful evaluation of devices regarding a selection for an onloading back to WWAN accesses imposes a challenge yet. In this direction, we present a performance metric that identifies devices degrading the WLAN capacity. While our performance metric tackles a reactive selection, it falls short to support a predictive evaluation, e.g., of devices which just joined the WLAN cell. Even worse, proprietary algorithms inside a WLAN stack impose a severe challenge as their internal routines are usually not conveyed via typical management interfaces. A well-known example for this category of algorithms are the link data rate adaptation schemes, with which WLAN devices adjust the modulation and coding scheme (MCS) for their transmissions. As MCSs resulting in low link data rates may specifically degrade the capacity of a WLAN cell, we focus on an estimation regarding the data rate selection of a device as a third contribution of this thesis. This estimation enables to select devices that will likely degrade the capacity of the WLAN hotspot for an onloading in advance

    Internet Access and QoS in Ad Hoc Networks

    Get PDF
    It is likely that the increased popularity of wireless local area networks (WLANs) together with the continuous technological advances in wireless communication, also increase the interest for ad hoc networks. An ad hoc network is a wireless, autonomous, infrastructure-less network composed of stations that communicate with each other directly in a peer-to-peer fashion. When discussing mobile ad hoc networks (MANETs), we often refer to an ad hoc network where the stations cooperate in forwarding packets on behalf of each other to allow communication beyond their transmission range over multi-hop paths. In order to realize the practical benefits of ad hoc networks, two challenges (among others) need to be considered: distributed quality of service (QoS) guarantees and multi-hop Internet access. This thesis presents conceivable solutions to both of these problems. The first two papers focus on the network layer and consider the provisioning of Internet access to ad hoc networks whereas the last two papers focus on the data link layer and investigate the provisioning of QoS to ad hoc networks. The first paper studies the interconnection between a MANET and the Internet. In addition, it evaluates three approaches for gateway discovery, which can be initiated by the gateway (proactive method), by the mobile station (reactive method) or by mixing these two approaches (hybrid method). The second paper also studies Internet access for MANETs, but with focus on micro mobility, i.e. mobile stations moving from one gateway to another. In particular, it evaluates a solution that allows mobile stations to access the Internet and roam from gateway to gateway. The third paper, gives an overview of the medium access mechanisms in IEEE 802.11 and their QoS limitations. Moreover, it proposes an enhancement to the contention-free medium access mechanism of IEEE 802.11e to provide QoS guarantees in WLANs operating in ad hoc network configuration. The fourth paper continues the work from the third paper by enhancing the scheme and dealing with the problems that occur due to hidden stations. Furthermore, it discusses how to deal with the problems that occur when moving from single-hop ad hoc networks (i.e. WLANs in ad hoc network configuration) to multi-hop ad hoc networks

    An Experimental Cross-Layer Approach to Improve the Vertical Handover Procedure in Heterogeneous Wireless Networks

    Get PDF
    Users of next generation wireless devices will be likely to move across a heterogeneous network environment. This will give them the possibility to always exploit the best connection to the global Internet. In order to keep a seamless connection, the handover between different access technologies, also known as vertical handover, must be as smooth as possible. The current evolution of network architectures toward an all-IP core favours the use of the Mobile IPv6 protocol to handle such handovers. However, this protocol still presents several drawbacks, mainly related to the assumption of static devices and wired connections. Hence we have designed and implemented a software module that exploits information from the lower layers (e.g. physical) to extend the capabilities of Mobile IPv6 to wireless environments. We have then evaluated both the plain Mobile IPv6 and our proposed implementation over an experimental testbed. The outcome of the assessment proves the effectiveness of our solution and reveals the possibility to perform a seamless vertical handover in heterogeneous wireless networks

    Evaluation of the impact of mobility models on handover in WLAN indoor environments

    Get PDF
    Nowadays, mobility models are used to simulate realistic movements produced by the users of a wireless or a mobile network. The aim of this project is to evaluate the impact of mobility models on handover process in Wireless Local Area Networks (WLAN) indoor environments, using the network simulator NS-2. This document contains a previous theoretical characterization of the basic mobility models and their application in the network simulator NS-2, a study of the infrastructure mode support and a modification of the current handover algorithm. The study focuses on two mobility models in WLAN indoor environments: one where movements are completely random (i.e. Random Waypoint) and another one where next step depends on previous movements (i.e. Gauss-Markov). In order to support infrastructure mode operation in WLAN, a new patch with modifications of the source code is applied. Furthermore, a first approach for the development of a new handover algorithm is presented. Simulations are run in two different scenarios: one with 4 Access Points (APs) offering full coverage in the simulated area, and another one with 8 APs, simulating overcoverage in order to guarantee higher capacity for a higher density of users. Results are presented showing a comparative of the cell residence time (CRT) for each scenario. From the results obtained, it is possible to see that the CRT changes depending on the algorithm and the mobility model applied, being lower when the Random Waypoint model is applied. On the other hand, the new handover algorithm designed from the current implementation leads to a decrease in the average CRT

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer
    • …
    corecore